Xlight FTP Server 3.9.3.6 contains a stack buffer overflow vulnerability in the 'Execute Program' configuration that allows attackers to crash the application. Attackers can trigger the vulnerability by inserting 294 characters into the program execution configuration, causing a denial of service condition.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/51665 | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/xlight-ftp-server-stack-buffer-overflow-vulnerability-via-execute-program | Third Party Advisory |
| https://www.xlightftpd.com/ | Vendor Advisory |
| https://www.exploit-db.com/exploits/51665 | Exploit Third Party Advisory |
Configurations
History
18 Dec 2025, 21:42
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:xlightftpd:xlight_ftp_server:3.9.3.6:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| CWE | CWE-787 | |
| References | () https://www.exploit-db.com/exploits/51665 - Exploit, Third Party Advisory | |
| References | () https://www.vulncheck.com/advisories/xlight-ftp-server-stack-buffer-overflow-vulnerability-via-execute-program - Third Party Advisory | |
| References | () https://www.xlightftpd.com/ - Vendor Advisory | |
| First Time |
Xlightftpd
Xlightftpd xlight Ftp Server |
15 Dec 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.exploit-db.com/exploits/51665 - |
15 Dec 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-15 21:15
Updated : 2025-12-18 21:42
NVD link : CVE-2023-53886
Mitre link : CVE-2023-53886
CVE.ORG link : CVE-2023-53886
JSON object : View
Products Affected
xlightftpd
- xlight_ftp_server
